tag:blogger.com,1999:blog-7892092374492686424.post8722515468944454709..comments2023-12-21T10:49:45.184-05:00Comments on David Sloane and the Computery Blog: A Security Policy Presentation In ProgressDCShttp://www.blogger.com/profile/13689463601770948400noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-7892092374492686424.post-65993968562334215802012-04-12T17:15:54.189-04:002012-04-12T17:15:54.189-04:00Building on -P's comments, there's no sens...Building on -P's comments, there's no sense of the alternatives or pitfalls. What can go wrong? What causes sec policies to be unloved/rejected/not work? What happens when one veers off the golden 9-step path?<br /><br />Is there evidence that this is better? (Better than what?)drjat42https://www.blogger.com/profile/16036956906889372610noreply@blogger.comtag:blogger.com,1999:blog-7892092374492686424.post-48737946155886898312012-04-12T13:08:03.074-04:002012-04-12T13:08:03.074-04:00In my opinion, it might be helpful to identify the...In my opinion, it might be helpful to identify the problem before you present solutions. You could explain experiences you've had trying to communicate your security policies to management or employees and how they helped you come up with the strategies you lay out to facilitate the process. Tech nerds love to laugh at people who don't know as much as they do (everyone does, actually), so I bet you could work in some humor there. <br /><br />Maybe you did this but I didn't see it in the slides. <br /><br />Also, did you practice giving the presentation out loud? You can punch up boring bits when you recognize them during practice sessions.<br /><br />You deserve cheering, clapping, and adoration! I bet you'll get it next time you present.-Phttps://www.blogger.com/profile/15322930035145720543noreply@blogger.com